![]() ![]() ![]() Reads data from stdin and outputs encrypted or decrypted results to stdout.Ī backconnect shell for Windows and Unix written in python and uses AES in CBC mode in conjunction with HMAC-SHA256 for secure transport.Īn extensible open format for the storage of disk images and related forensic information. ![]() This python script looks for a large amount of possible administrative interfaces on a given site. Python3 tool to perform password spraying against Microsoft Online service using various methods.Īctive Directory Integrated DNS dumping by any authenticated user.ĪDM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interfaceĪctive Directory ACL exploitation with BloodHound.Īn LDAP based Active Directory user and group enumeration tool.Īctive Directory Assessment and Privilege Escalation Script.Ī pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos. ![]() Web security tool to make fuzzing at HTTP inputs, made in C with libCurl.Īuto Scanning to SSL Vulnerability (HeartBleed, CCS Injection, SSLv3 POODLE, FREAK, LOGJAM Attack, SSLv2 DROWN etc).īypassing WAF by abusing SSL/TLS Ciphers.Ī password dictionary attack tool that targets windows authentication via the SMB protocol.Īutomated Corporate Enumerator. List of all available tools for penetration testing. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |